getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Privileged Access Management Software - Page 2

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


70 software options

Infisign logo

Cloud-based identity and access management (IAM) solution

learn more
Infisign stands at the forefront of Identity and Access Management (IAM) solutions, driven by a zero-trust philosophy that offers increased security and privacy control for all authentication requirements for organizations of all sizes.

Read more about Infisign

Users also considered
VaultOne logo

Digital security platform for password & identity management

learn more
VaultOne is an identity and access management software designed to help businesses secure users' credentials and control access permissions to infrastructures, websites, servers, databases, and applications from a centralized platform.

Read more about VaultOne

Users also considered
VISULOX logo

Privileged access management solution

learn more
Leading privileged access management solution with an integrated remote support platform for secure external access. VISULOX is the answer to who did what, where, and when in your IT Infrastructure.

VISULOX is easy to integrate and rapidly improves the security cloud, hybrid, or on-prem deployments

Read more about VISULOX

Users also considered
ManageEngine EventLog Analyzer logo

Web-Based SIEM & Log Management Solution. Affordable Prices.

learn more
EventLog Analyzer is a web-based security information and event management (SIEM) solution, which assists small to large organizations with the monitoring of network devices, servers and applications. Key features include auditing, traffic analysis, threat detection, and compliance management.

Read more about ManageEngine EventLog Analyzer

Users also considered
LogMeOnce logo

Password and identity management solution

learn more
LogMeOnce is a cloud-based password and identity management solution that helps businesses of all sizes manage login credentials, provide secure access to documents, applications and services via a unified portal. The platform allows organizations to protect user accounts against hack attempts and identity theft by scanning the dark web for stolen passwords.

Read more about LogMeOnce

Users also considered
Ping Identity logo

Experience a better experience with Ping Identity.

learn more
Ping Identity delivers intelligent identity solutions that help enterprises balance security and personalized user experiences. Leverage our best-in-class identity solutions with the 3rd party services you already use to remove passwords, prevent fraud, support Zero Trust, and anything in between.

Read more about Ping Identity

Users also considered
Syteca logo

PAM platform, reinforced with ITDR Intelligence.

learn more
Besides monitoring functionality, Ekran System® provides identity management and access management within a single endpoint agent. The product includes two-factor authentication, one-time passwords, privileged account and session management (PASM), ticketing system integrations, and other functions.

Read more about Syteca

Users also considered
Bitwarden logo

The Most Trusted Open Source Password Manager for Business

learn more
Bitwarden is an open source solution that secures credentials with end-to-end encryption and manages account access.

Read more about Bitwarden

Users also considered
Zilla Security logo

Cloud security and threat detection platform

learn more
Zilla Security provides on-premises users remote access to their enterprise resources. Employees can access files, messages, and emails from any device while adhering to compliance policies.

Read more about Zilla Security

Users also considered
HelloID logo

Cloud-based, User Provisioning, Self-Service, and SSO.

learn more
HelloID is a complete, cloud-based IDaaS solution that streamlines user provisioning, self-service, and single sign-on processes within your organization or educational institution. Automate the entire user lifecycle process with HelloID by connecting your HR/SIS data to all your downstream systems.

Read more about HelloID

Users also considered
Password Safe logo

Centralized management and control of all privileged account

learn more
BeyondTrust Password Safe combines privileged password and session management to discover, manage, and audit all privileged credential activity. Achieve complete control and accountability over privileged accounts

Read more about Password Safe

Users also considered
Rublon logo

Workforce Multi-Factor Authentication for SMB and Enterprise

learn more
Secure local and remote access to networks, servers and applications using multi-factor authentication (MFA) with hardware and software authentication methods like U2F/WebAuthn Security Keys, Mobile Push, Mobile Passcode (TOTP), SMS Passcode and Email Link. Use Active Directory as Identity Provider.

Read more about Rublon

Users also considered
Secret Server Password Manager logo

Password and privileged access management software

learn more
Secret Server Password Manager is a privileged access and passwords management platform designed to help IT admins and IT security professionals manage administrative processes and monitor all password management-related operations across the organization.

Read more about Secret Server Password Manager

Users also considered
Passbolt logo

Secure password collaboration for tech teams

learn more
Passbolt: Mission critical password management that scales with your organization.
Passbolt is an open source password collaboration manager designed for tech teams first. It allows them to share passwords instantly, securely and granularly while keeping full audit capabilities.

Read more about Passbolt

Users also considered
Auth0 logo

Secure access for everyone. But not just anyone.

learn more
Auth0 gives you a platform to authenticate and authorize, providing secure access to applications, devices, and users. Auth0 provides the simplicity and extensibility to scale and protect any application, for any audience. Integrate Auth0 into any app, written in any language, and any framework.

Read more about Auth0

Users also considered
Cisco Duo logo

Cloud-based identity security and access management

learn more
Cisco Duo is a cloud-based identity security solution that secures access to your critical resources for any user and device, from anywhere. Easy to use and deploy, Duo provides identity-first protection and deep visibility across your identity ecosystem, whether multi-cloud, hybrid, or on-premises.

Read more about Cisco Duo

Users also considered
Keeper Security logo

Secure password management and digital vault.

learn more
Keeper is a password manager and digital vault protecting passwords and sensitive digital assets for thousands of businesses and millions of individuals.

Read more about Keeper Security

Users also considered
Access Rights Manager logo

Audit management for access rights

learn more
SolarWinds Access Rights Manager (ARM) is an access governance solution that manages and audit access rights across any IT infrastructure to mitigate insider threats and data loss.

Read more about Access Rights Manager

Users also considered
Teramind logo

Employee Monitoring, UAM, ITM & IRM, DLP, and Compliance.

learn more
Teramind is a unified employee monitoring, insider threat detection, data loss prevention, compliance and governance solution. Track digital interactions, optimize productivity, monitor privileged users, to enforce policies, prevent IP and data leaks and maintain and prove regulatory compliance.

Read more about Teramind

Users also considered
ManageEngine AD360 logo

Identity and access management platform

learn more
ManageEngine AD360 is an enterprise IAM software solution that helps businesses of all sizes manage identities securely and ensure compliance. Key functionalities include automated identity lifecycle management, secure single sign-on, adaptive multi-factor authentication, approval-based workflows.

Read more about ManageEngine AD360

Users also considered
AWS CloudTrail logo

Activity and usage monitoring tool for AWS accounts

learn more
AWS CloudTrail is a cloud-based software designed to help businesses monitor the activities of AWS accounts and manage various operational processes related to compliance, auditing, and more. Supervisors can perform security analysis and view, search or download the required event history of selected AWS accounts.

Read more about AWS CloudTrail

Users also considered
OneLogin logo

Cloud-Based Identity Management & Single Sign-On System

learn more
OneLogin’s cloud based identity management platform provides secure single sign-on, multi-factor authentication and directory integration with AD, LDAP.

In addition to the above features, Gartner has recently named OneLogin a Leader in the 2020 Magic Quadrant for Access Management.

Read more about OneLogin

Users also considered
NordLayer logo

Cloud-based network security platform for businesses

learn more
Privileged access management focuses on IT admins with unrestricted access to company data, apps and control over access roles of the rest of the organization user access management. The NordLayer solution analyzes and audits internal activities to prevent, isolate and disable any deviations.

Read more about NordLayer

Users also considered
BeyondTrust Remote Support logo

Secure remote access software

learn more
BeyondTrust Remote Support enables help desk teams to quickly and securely access and fix any remote device, running any platform, located anywhere in the world through one solution.

Read more about BeyondTrust Remote Support

Users also considered
Keeper Secrets Manager logo

Infrastructure security platform

learn more
Keeper Secrets Manager is a cloud-based, fully-managed, zero-knowledge platform designed to secure sensitive infrastructure data including access keys, database passwords, API keys, certificates, and other privileged credentials.

Read more about Keeper Secrets Manager

Users also considered